Northwestern Computer Science leaders Samir Khuller and Sara Owsley Sood are no strangers to tidal shifts in their discipline’s technology. In June 2007, Sood graduated from Northwestern Engineering ...
How end-to-end encryption is the wall that keeps our digital secrets safe – and why modern life would be unimaginable without ...
The FBI served Microsoft a warrant requesting encryption recovery keys to decrypt the hard drives of people involved in an ...
Microsoft complied with a warrant to hand over BitLocker recovery keys to the FBI, and privacy advocates are worried.
Nicola Dell, a computer scientist studying the role of technology in intimate partner violence, cofounded the Center to End ...
Here's how emerging encryption innovations can help organizations reduce risk, strengthen compliance and prepare for next-gen ...
A new study uncovers how tiny misalignments in quantum communication links can quietly undermine security. Quantum key distribution (QKD) is a next generation method for protecting digital ...
While ‘traditional’ ransomware attacks remain stable, some gangs are shifting towards exploiting zero-days and supply chains to go straight to stealing data ...
Worried about AI privacy? This new tool from Signal's founder adds end-to-end encryption to your chats ...
As deepfakes blur the line between truth and fiction, we’ll need a new class of forensic experts to determine what’s real, ...
You may unsubscribe at any time. By signing up, you agree to our terms of use and privacy policy. This site is protected by ...